[go: up one dir, main page]

KR20180082697A - Operation method of the home area network capable reinforcing the security for managing power demand efficiently - Google Patents

Operation method of the home area network capable reinforcing the security for managing power demand efficiently Download PDF

Info

Publication number
KR20180082697A
KR20180082697A KR1020170003505A KR20170003505A KR20180082697A KR 20180082697 A KR20180082697 A KR 20180082697A KR 1020170003505 A KR1020170003505 A KR 1020170003505A KR 20170003505 A KR20170003505 A KR 20170003505A KR 20180082697 A KR20180082697 A KR 20180082697A
Authority
KR
South Korea
Prior art keywords
security
area network
home area
customer
operation method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
KR1020170003505A
Other languages
Korean (ko)
Inventor
현재호
Original Assignee
(주) 코콤
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by (주) 코콤 filed Critical (주) 코콤
Priority to KR1020170003505A priority Critical patent/KR20180082697A/en
Priority to PCT/KR2018/000387 priority patent/WO2018131862A1/en
Publication of KR20180082697A publication Critical patent/KR20180082697A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5041Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
    • H04L41/5051Service on demand, e.g. definition and deployment of services in real time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Remote Monitoring And Control Of Power-Distribution Networks (AREA)

Abstract

본 발명은 효율적인 수요관리를 위한 보안성이 강화된 홈 영역 네트워크 운영방법에 관한 것이다. The present invention relates to a home area network operating method with enhanced security for efficient demand management.

Description

효율적인 수요관리를 위한 보안성이 강화된 홈 영역 네트워크 운영방법{OPERATION METHOD OF THE HOME AREA NETWORK CAPABLE REINFORCING THE SECURITY FOR MANAGING POWER DEMAND EFFICIENTLY}[0001] OPERATION METHOD OF THE HOME AREA NETWORK CAPABLE REINFORCING THE SECURITY FOR MANAGING POWER DEMAND EFFICIENTLY [0002]

본 발명은 효율적인 수요관리를 위한 보안성이 강화된 홈 영역 네트워크 운영방법에 관한 것이다.The present invention relates to a home area network operating method with enhanced security for efficient demand management.

현재 능동적 전력 관리를 목표로 하는 국가들은 대부분 DSM (Demand Side Management)를 운영하고 있다. Currently, most of the countries that are aiming at active power management are running Demand Side Management (DSM).

그러나 이는 수용가(전기를 사용하는 한국정력의 고객)의 전력 제어를 위한 네트워크가 어떤 방식으로 구성되어있는가에 따라 DSM 이 가능여부가 결정된다.However, this is based on the way in which the network for power control of the consumer (the customer of the Korean vigor using the electricity) is configured to determine whether DSM is possible.

즉, 수용가에서의 네트워크 기반이 매우 중요한 역할을 한다. 그러나, DSM 을 위하여 수용가에서 자체 비용으로 네트워크를 구축할 수도 없거니와, 현재 DSM 을 위한 네트워크 체제가 표면화 되어 있는 것도 아니다.In other words, the network infrastructure in the customer plays a very important role. However, for the DSM, it is impossible for the customer to build a network at its own expense, and the network system for the DSM is not surfaced at present.

이를 위해, 가전 기기 등 전기를 사용하는 장치 또는 장비의 전원 인입부에 설치되어 전기의 사용량을 감지하고, 감지 결과에 따른 서비스적인 후속 조치를 가능하게 하는 제반 구성이 필요하다.For this purpose, there is a need for a configuration that is installed in a power input portion of a device or an apparatus that uses electricity such as a household appliance to detect the amount of electricity used and enable service follow-up according to the detection result.

따라서, 원격 검침 기능을 이용하여 수용가의 수전점에 설치된 전력량계에서 유무선 통신으로 수용가의 전력량을 측정할 수 있도록 수용가 내의 전기 사용 기기 간의 네트워크 구성이 필요하다.Therefore, it is necessary to construct a network between the electric devices in the customer so that the electric power of the customer can be measured by wired / wireless communication in the watt hour meter provided at the water receiving point of the customer by using the remote meter reading function.

한국공개특허공보 제10-2003-0020388호Korean Patent Publication No. 10-2003-0020388

본 발명이 해결하고자 하는 과제는, 해킹으로 인한 침입을 조기 차단하여 보안성을 강화하는 효율적인 수요관리를 위한 보안성이 강화된 홈 영역 네트워크 운영방법을 제공하는 것이다.SUMMARY OF THE INVENTION It is an object of the present invention to provide a home area network operating method with enhanced security for efficiently managing demand by enhancing security by preventing an intrusion by hacking.

본 발명은 수요 관리를 이용하여 외부로부터 수용가의 기기 제어를 허용하여 제한되고 인가죈 정보에 국한하여 진입을 허락함으로써 홈 영역 네트워크에서의 보안성을 강화할 수 있다.The present invention can enhance the security in the home area network by allowing the control of the device of the customer from the outside by using the demand management and allowing the entry to be limited to the authorized information.

도 1은 홈 영역 네트워크의 구성을 나타내는 도면이다.
도 2는 고객의 휴대폰의 컴퓨팅 파워를 이용하여 암호를 해독하고 이에 따른 인증서 발급 등의 기능을 통하여 DM 요구 신호의 보안성을 강화하는 과정을 설명하는 도면이다.
1 is a diagram showing a configuration of a home area network.
FIG. 2 is a diagram illustrating a process of enhancing the security of a DM request signal by decrypting a password using the computing power of a customer's mobile phone and issuing a certificate according to the decryption.

이하에서는, 본 발명의 바람직한 실시예에 기초하여 본 발명을 보다 구체적으로 설명한다. 그러나, 하기 실시예는 본 발명의 이해를 돕기 위한 일 예에 불과한 것으로 이에 의해 본 발명의 권리범위가 축소되거나 한정되는 것은 아니다.Hereinafter, the present invention will be described more specifically based on preferred embodiments of the present invention. However, the following embodiments are merely examples for helping understanding of the present invention, and thus the scope of the present invention is not limited or limited.

DSM (Demand Side Management; 수요관리)의 궁극적 목적은 전력수요를 합리적으로 조절하여 부하율 향상을 통한 원가절감과 전력 수급안정을 도모함과 동시에 국가적인 에너지자원 절약에도 기여하는데 있다. 또한 최근에는 화석연료 사용에 따른 환경오염문제가 심각히 대두됨에 따라 환경친화적인 에너지정책 대안으로 강조되고 있다 The ultimate goal of DSM (Demand Side Management) is to contribute to national energy saving while reducing cost, rationalizing supply and demand, and rationalizing power demand. Recently, environmental pollution caused by the use of fossil fuels has become serious, and it is emphasized as an environment friendly energy policy alternative

부하율이란 일정기간에 있어서 최대전력에 대한 평균전력의 비율을 말하며 최대전력을 감소하거나 평균전력을 증대시킴으로써 부하율을 향상할 수 있다.The load factor is the ratio of the average power to the maximum power in a certain period, and the load factor can be improved by decreasing the maximum power or increasing the average power.

DSM 의 단편적 기능 표현으로는 전력공급회사에서 수용가의 특정 전기 또는 전자 제품을 사전 허용한도 내에서 제어를 함으로써 전력 수요를 조절 관리 하는 방식을 뜻한다. 현재 미국에서는 피크 전력 시간에 수용가의 에어컨 온도를 2도 상향하는 등의 제어를 전력 공급회사가 함으로써 DSM을 통한 부하율을 조율 하고 있다.DSM's piecemeal function expression refers to a way in which a power supply company manages and controls the demand for electricity by controlling certain electrical or electronic products of the consumer within a preliminary limit. In the US, the power supply company controls the load factor through DSM by controlling the temperature of the customer's air conditioner by two degrees in peak power time.

원래 수요관리(DSM)라는 용어는 1970년대 미국에서 시작하여 점차 각 국으로 확산되었으며 그간 이론적 경제성과 높은 잠재적 기여도에도 불구하고 종전 전력회사 공급측 위주의 전력수급계획 추진에 따라 별 관심을 받지 못하다가 전원입지의 확보난 가중, 건설에 따른 막대한 투자 재원의 조달문제, 환경규제의 강화 등으로 공급설비의 적기확보가 어려워지고 최근 최소비용계획(least cost planning)의 일환으로 공급측 대안과 수요측 대안의 최적조합을 찾는 통합자원계획 (Integrated Resource Planning) 개념의 확산으로 수요관리 방안을 전력수급계획에서 필수적인 고려사항으로 간주하게 되어 수요관리의 중요성이 더욱 강조 되었다.The term DSM originally originated in the United States in the 1970s and gradually spread to other countries. Despite the theoretical economic and high potential contribution, As a result of the difficulty in securing timely provision of supply facilities due to the increase in the number of sites secured, the procurement of huge investment resources due to construction, and the strengthening of environmental regulations, the optimal combination of supply side and demand side alternatives , The importance of demand management has been emphasized because the idea of managing demand has been regarded as an essential consideration in the power supply plan by the spread of integrated resource planning concept.

전력공급회사에서 수 많은 수용가와 통신 인프라를 구축하기 힘드므로 본 발명에서는 수용가에 있는 무선공유기(또는 인터넷공유기)를 기반으로 인터넷 통신을 하는 것을 전제로 한다. 수용가의 다수 기기는 홈 영역 네트워크(Home Area Network: 이하, HAN)으로 구성 되어 있으며 HAN은 다양한 방법을 통하여 구성 될 수 있다. 이러한 환경에서 TCP/IP 등의 신뢰성 기반의 통신을 하는 과정에서 해킹 등에 취약 해 질 수 있다. (도 1 참조)Since it is difficult for a power supply company to build a large number of customers and a communication infrastructure, the present invention presupposes that an Internet communication is performed based on a wireless router (or an Internet router) in a customer. A plurality of devices of a customer are composed of a home area network (HAN), and the HAN can be configured through various methods. In this environment, it can be vulnerable to hacking and the like in the course of performing reliability based communication such as TCP / IP. (See Fig. 1)

도 1과 같은 HAN 기반의 환경 구축은 가능하나 본 발명에서는 동일 환경 내에서 보안성의 강화를 목적으로 한다. 보안성은 대표적 해킹인 DDOS 등의 침입을 조기 차단하는 것을 목적으로 한다Although it is possible to construct an environment based on HAN as shown in FIG. 1, the present invention aims to enhance security in the same environment. The purpose of security is to prevent intrusions such as DDOS which is a typical hack

이러한 목적으로는 NIDS, HIDS, NIPS, HIPS 등의 장비 또는 방식이 있으나 본 발명에서는 기기 내 네트워크(HAN 등) 에서의 보안에 관한 것이다.For this purpose, there are devices or systems such as NIDS, HIDS, NIPS, and HIPS, but the present invention relates to security in an intra-device network (HAN, etc.).

즉 DSM 은 외부로부터 수용가의 기기 제어를 허용하는 것이므로 제한되고 인가된 정보에 국한되어 진입을 허락하여야 한다.In other words, the DSM permits the control of the equipment of the customer from the outside, so it should be limited to limited and authorized information.

한편, 도 2는 고객의 휴대폰의 컴퓨팅 파워를 이용하여 암호를 해독하고 이에 따른 인증서 발급 등의 기능을 통하여 DM 요구 신호의 보안성을 강화한다.Meanwhile, FIG. 2 enhances the security of the DM request signal by decrypting the password using the computing power of the customer's mobile phone and issuing a certificate according to the decryption.

이상에서 본 발명에 대한 기술 사상을 첨부 도면과 함께 서술하였지만, 이는 본 발명의 바람직한 실시예를 예시적으로 설명한 것이지 본 발명을 한정하는 것은 아니다. 또한, 이 기술 분야의 통상의 지식을 가진 자라면 누구나 본 발명의 기술 사상의 범주를 이탈하지 않는 범위 내에서 다양한 변형 및 모방이 가능함은 명백한 사실이다.Although the preferred embodiments of the present invention have been disclosed for illustrative purposes, those skilled in the art will appreciate that various modifications, additions and substitutions are possible, without departing from the scope and spirit of the invention as disclosed in the accompanying claims. In addition, it is a matter of course that various modifications and variations are possible without departing from the scope of the technical idea of the present invention by anyone having ordinary skill in the art.

Claims (3)

고객의 휴대폰의 컴퓨팅 파워를 이용하여 암호를 해독하고, 암호 해독에 따라 인증서를 발급하는, 효율적인 수요관리를 위한 보안성이 강화된 홈 영역 네트워크 운영방법.A method for operating a home area network with enhanced security for efficiently managing demand by decrypting a password using the computing power of a customer's cell phone and issuing a certificate upon decryption. 제1항에 있어서,
상기 인증서 발급을 이용하여 수요관리 요구신호의 보안성을 강화하는, 효율적인 수요관리를 위한 보안성이 강화된 홈 영역 네트워크 운영방법.
The method according to claim 1,
And the security of the demand management request signal is enhanced by using the certificate issuance.
제2항에 있어서,
동일 환경 내에서 분산서비스거부공격 침입을 차단하도록 보안성을 강화하는, 효율적인 수요관리를 위한 보안성이 강화된 홈 영역 네트워크 운영방법.
3. The method of claim 2,
A security-enhanced home area network operating method for efficient demand management that enhances security to prevent distributed denial of service attacks in the same environment.
KR1020170003505A 2017-01-10 2017-01-10 Operation method of the home area network capable reinforcing the security for managing power demand efficiently Withdrawn KR20180082697A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
KR1020170003505A KR20180082697A (en) 2017-01-10 2017-01-10 Operation method of the home area network capable reinforcing the security for managing power demand efficiently
PCT/KR2018/000387 WO2018131862A1 (en) 2017-01-10 2018-01-09 Security-enhanced home area network operating method for efficient demand management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020170003505A KR20180082697A (en) 2017-01-10 2017-01-10 Operation method of the home area network capable reinforcing the security for managing power demand efficiently

Publications (1)

Publication Number Publication Date
KR20180082697A true KR20180082697A (en) 2018-07-19

Family

ID=62839385

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020170003505A Withdrawn KR20180082697A (en) 2017-01-10 2017-01-10 Operation method of the home area network capable reinforcing the security for managing power demand efficiently

Country Status (2)

Country Link
KR (1) KR20180082697A (en)
WO (1) WO2018131862A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110874911B (en) * 2019-11-12 2022-04-22 上海盛付通电子支付服务有限公司 Information transmission method, electronic device, and computer-readable storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20030020388A (en) 2001-05-17 2003-03-08 코닌클리케 필립스 일렉트로닉스 엔.브이. Wireless master-slave distributed communications network

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100889670B1 (en) * 2007-08-08 2009-03-19 삼성에스디에스 주식회사 How to block TCP-based denial of service attacks on mobile devices
JP2011154410A (en) * 2010-01-25 2011-08-11 Sony Corp Analysis server and method of analyzing data
KR101214427B1 (en) * 2010-12-27 2013-01-09 한국전기연구원 Supervisory Control and Data Acquisition System and Security management method thereof
KR101213287B1 (en) * 2011-02-23 2012-12-20 한국전자통신연구원 Building energy integration management apparatus and building energy integration management method
US20180278091A1 (en) * 2014-11-07 2018-09-27 Kazunori Fukasawa Communication system, communication apparatus, method of controlling the communication apparatus, and program

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20030020388A (en) 2001-05-17 2003-03-08 코닌클리케 필립스 일렉트로닉스 엔.브이. Wireless master-slave distributed communications network

Also Published As

Publication number Publication date
WO2018131862A1 (en) 2018-07-19

Similar Documents

Publication Publication Date Title
Zografopoulos et al. Distributed energy resources cybersecurity outlook: Vulnerabilities, attacks, impacts, and mitigations
Mousavian et al. A risk-based optimization model for electric vehicle infrastructure response to cyber attacks
Jokar et al. A survey on security issues in smart grids
US8639922B2 (en) System, method, and apparata for secure communications using an electrical grid network
Choi et al. Multi-agent based cyber attack detection and mitigation for distribution automation system
US20180227627A1 (en) System and method for secure appliance operation
CA3039624C (en) System and method for secure appliance operation
Mohammed et al. Vulnerabilities and strategies of cybersecurity in smart grid-evaluation and review
Wagner et al. Smart grid cyber security: A German perspective
Zhao et al. An overview of cyber security for smart grid
Vigo et al. Smart grid security a smart meter-centric perspective
Kumar et al. Secure communication for advance metering infrastructure in smart grid
KR20180082697A (en) Operation method of the home area network capable reinforcing the security for managing power demand efficiently
Lighari et al. Attacks and their defenses for advanced metering infrastructure
Maruvala et al. Cyberattack issues on smart metering infrastructure
Chang et al. Design of an authentication and key management system for a smart meter gateway in AMI
Nie et al. M2M security threat and security mechanism research
Wang Smart grid, automation, and scada systems security
Kuroptev et al. Coordinated cyber attacks on smart grids considering software supply chains
Bhadani Smart Grid Security: Innovative Approaches for Threat Detection and Countermeasures
Wu et al. Cyber Security and information protection in a smart grid environment
Yaghmaee et al. Monitoring approach for detection compromise attacks in smart meter
He et al. Design of Multi-Layer Information Security Protection Scheme for Vehicle-to-Grid System
Seo et al. The green defenders
KR101243943B1 (en) System and method for power management in the smart grid

Legal Events

Date Code Title Description
PA0109 Patent application

Patent event code: PA01091R01D

Comment text: Patent Application

Patent event date: 20170110

PG1501 Laying open of application
PC1203 Withdrawal of no request for examination